Interest in IoT Yields Interest in OT Security

Tuesday, May 31, 2016 @ 07:05 PM gHale


By Paul Rogers
The more an organization wants to raise productivity, the more its individual parts need to connect — devices to systems, machines to data, people to processes — to create increased automation.

Heat sensors tell the system when to cool down. Instruments detect when medical tests are complete. Viscosity sensors keep oil running through pipelines. These man-to-man, man-to-machine and machine-to-machine connections on the Industrial Internet increase productivity and efficiencies.

RELATED STORIES
Securing Physical Security
Physical Security Meets OT
Critical Infrastructure Specialists
OT Security: Educate our ‘Publics’

The Industrial Internet represents a huge opportunity for growth and efficiency. To realize the full benefits of the Industrial Internet, organizations have to connect to the Internet, to local and wide area networks, to IT and to other control systems.

Today, the industrial world runs on critical physical assets and embedded systems known as operational technology (OT). Gartner, Inc. forecasts that 6.4 billion connected Internet of Things (IoT) will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new things will get connected every day.

However, this growing number of connected devices also greatly expands the attack surface. Every new connection adds to that which security professionals must protect.

Adding to the difficulty, those who attempt to hack into the Industrial Internet tend to have a lower risk/higher reward dynamic than those who attack Information Technology (IT) networks. Operational Technology (OT) hackers have little chance of getting caught and a high payoff of creating havoc if they get through. Compared to IT hackers who end up with data, OT hackers can cause immense havoc, such as disabling a factory or generating other debilitating disruptions. Thus, OT hackers are much more persistent when they decide to target a site. In fact, the odds are stacked in favor of the OT attacker due to deteriorating network perimeters and the rapid increases in connected devices. In spite of such realities, a great amount of budget is typically spent on IT cyber security; not so much for OT security.

Since security professionals don’t understand the Industrial Internet’s role in today’s chase for increased productivity, they don’t understand the threat. “Intruders can’t get into my critical infrastructure to create havoc because my Industrial Internet is air-gapped.” This is a legacy technique that too many cyber security professionals still count upon. They believe their Industrial Internet is truly and physically isolated from such unsecured networks such as the public Internet or unsecured local area networks. In some cases, they don’t appreciate that air-gapping, which may have been safe several years ago, no longer does the job that cyber security professionals can rely upon.

Thus, today, there can be a false sense of security when protecting a network that does not have, and often has never had, an active unsecured connection. There are two major reasons why this is not possible:
1. If a system is operating in isolation, that doesn’t mean it can’t get attached. An employee simply accessing an email with a keyboard can breach the gap.
2. In today’s world, to raise productivity, a system must be connected. Somewhere along the connectivity chain, the system is going to become attached — either willfully or through a possible error. In fact, most CISO’s are more concerned over accidental activities by authorized users versus threats by external adversaries.

Raising OT Cyber Security Awareness
It seems like every B2B trade publication has articles on the IoT. Although security concerns never seem to be the subject of the article, security directors are reading between the lines. And, although these articles don’t typically address the real problems inherent with protecting such systems, they are starting, at least, discuss the issues.

A case in point was the new Connected Security trade show – an event at a major physical security exposition, ISC West in Las Vegas, this past April. The event was coined as “the only event that focuses on building a holistic security strategy for the connected enterprise, including looking how physical and information security can end up used together to mitigate new and emerging cyber threats in a hyper-connected world.” This was followed by a sign that reads: “Close the Gap between Security and IoT.”

To the OT cyber security purist, the tagline might cause some widespread discussion and debate of how to protect the Industrial Internet. Nonetheless, the very fact that a whole new group of security professionals is now looking at connected systems via understanding the IoT as a new security frontline is good for all.

As the IoT is rapidly changing the industrial control landscape, it and what it leads to, will change the very nature of industrial cyber security. Future Industrial Internet security strategies will require a broader scope that includes cloud systems and remote devices, more emphasis on device-centric security and secure-by-design and a shift from security management silos to IT-OT security networks.

Wurldtech's Paul Rogers

Wurldtech’s Paul Rogers

Paul Rogers is the president and chief executive of Wurldtech and general manager of GE Industrial Cyber Security. Wurldtech is an independent subsidiary of GE, which acquired the company in 2014.